crypto/krb5/src/lib/crypto/builtin/des/t_verify.c
219
mit_des_key_sched(key2, sched);
crypto/krb5/src/lib/crypto/builtin/des/t_verify.c
90
unsigned char key2[8] = { 0x08,0x19,0x2a,0x3b,0x4c,0x5d,0x6e,0x7f };
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
121
key2 = (char *)malloc(100);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
132
key2 = fgets(get_key, 100, keys);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
133
if (!key2)
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
135
key.data = (void *)key2;
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
136
key.size = strlen(key2);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
14
char *key_line, *val_line, *get_key, *get_val, *old, *key2;
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
143
free(key2);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
148
key2 = (char *)malloc(100);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
160
key2 = fgets(key2, 100, keys);
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
161
if (!key2)
crypto/krb5/src/plugins/kdb/db2/libdb2/test/hash2.tests/passtest.c
178
free(key2);
crypto/openssh/hmac.c
177
u_char *key2 = "Jefe";
crypto/openssh/hmac.c
192
hmac_test(key2, strlen(key2), data2, strlen(data2), dig2, sizeof(dig2));
crypto/openssh/openbsd-compat/blowfish.c
662
char key2[] = "abcdefghijklmnopqrstuvwxyz";
crypto/openssh/openbsd-compat/blowfish.c
682
blf_key(&c, (u_int8_t *) key2, strlen(key2));
crypto/openssl/crypto/aes/aes_ige.c
182
const AES_KEY *key2, const unsigned char *ivec,
crypto/openssl/crypto/des/str2key.c
46
void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2)
crypto/openssl/crypto/des/str2key.c
52
memset(key2, 0, 8);
crypto/openssl/crypto/des/str2key.c
61
(*key2)[i % 8] ^= (j << 1);
crypto/openssl/crypto/des/str2key.c
69
(*key2)[7 - (i % 8)] ^= j;
crypto/openssl/crypto/des/str2key.c
73
memcpy(key2, key1, 8);
crypto/openssl/crypto/des/str2key.c
75
DES_set_odd_parity(key2);
crypto/openssl/crypto/des/str2key.c
78
DES_set_key_unchecked(key2, &ks);
crypto/openssl/crypto/des/str2key.c
79
DES_cbc_cksum((const unsigned char *)str, key2, length, &ks, key2);
crypto/openssl/crypto/des/str2key.c
82
DES_set_odd_parity(key2);
crypto/openssl/crypto/evp/e_aes.c
314
xctx->xts.key2 = &xctx->ks2;
crypto/openssl/crypto/evp/e_aes.c
3210
if (xctx->xts.key2) {
crypto/openssl/crypto/evp/e_aes.c
3211
if (xctx->xts.key2 != &xctx->ks2)
crypto/openssl/crypto/evp/e_aes.c
3213
xctx_out->xts.key2 = &xctx_out->ks2;
crypto/openssl/crypto/evp/e_aes.c
3220
xctx->xts.key2 = NULL;
crypto/openssl/crypto/evp/e_aes.c
3334
xctx->xts.key2 = &xctx->ks2;
crypto/openssl/crypto/evp/e_aes.c
3347
|| xctx->xts.key2 == NULL
crypto/openssl/crypto/evp/e_aes.c
3366
xctx->xts.key1, xctx->xts.key2,
crypto/openssl/crypto/evp/e_aes.c
70
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/crypto/evp/e_aes.c
700
xctx->xts.key2 = &xctx->ks2;
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
256
int ossl_ml_dsa_key_equal(const ML_DSA_KEY *key1, const ML_DSA_KEY *key2,
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
261
if (key1->params != key2->params)
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
266
if (key1->pub_encoding != NULL && key2->pub_encoding != NULL) {
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
267
if (memcmp(key1->pub_encoding, key2->pub_encoding,
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
276
if (key1->priv_encoding != NULL && key2->priv_encoding != NULL) {
crypto/openssl/crypto/ml_dsa/ml_dsa_key.c
277
if (memcmp(key1->priv_encoding, key2->priv_encoding,
crypto/openssl/crypto/ml_kem/ml_kem.c
2346
int ossl_ml_kem_pubkey_cmp(const ML_KEM_KEY *key1, const ML_KEM_KEY *key2)
crypto/openssl/crypto/ml_kem/ml_kem.c
2353
if (ossl_ml_kem_have_pubkey(key1) && ossl_ml_kem_have_pubkey(key2))
crypto/openssl/crypto/ml_kem/ml_kem.c
2354
return memcmp(key1->pkhash, key2->pkhash, ML_KEM_PKHASH_BYTES) == 0;
crypto/openssl/crypto/ml_kem/ml_kem.c
2360
return (!(ossl_ml_kem_have_pubkey(key1) ^ ossl_ml_kem_have_pubkey(key2)));
crypto/openssl/crypto/modes/xts128.c
41
(*ctx->block2)(tweak.c, tweak.c, ctx->key2);
crypto/openssl/crypto/modes/xts128gb.c
41
(*ctx->block2)(tweak.c, tweak.c, ctx->key2);
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
189
int ossl_slh_dsa_key_equal(const SLH_DSA_KEY *key1, const SLH_DSA_KEY *key2,
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
195
if (key1->params != key2->params)
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
200
if (key1->pub != NULL && key2->pub != NULL) {
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
201
if (memcmp(key1->pub, key2->pub, key1->params->pk_len) != 0)
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
208
if (key1->has_priv && key2->has_priv) {
crypto/openssl/crypto/slh_dsa/slh_dsa_key.c
209
if (memcmp(key1->priv, key2->priv,
crypto/openssl/fuzz/ml-dsa.c
160
void **key1, void **key2)
crypto/openssl/fuzz/ml-dsa.c
277
void **key1, void **key2)
crypto/openssl/fuzz/ml-dsa.c
280
|| !keygen_ml_dsa_real_key_helper(buf, len, (EVP_PKEY **)key2))
crypto/openssl/fuzz/ml-dsa.c
460
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/ml-dsa.c
505
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/ml-dsa.c
508
EVP_PKEY *bob = (EVP_PKEY *)key2;
crypto/openssl/fuzz/ml-dsa.c
528
static void cleanup_ml_dsa_keys(void *key1, void *key2,
crypto/openssl/fuzz/ml-dsa.c
532
EVP_PKEY_free((EVP_PKEY *)key2);
crypto/openssl/fuzz/ml-kem.c
141
void **key1, void **key2)
crypto/openssl/fuzz/ml-kem.c
203
void **key1, void **key2)
crypto/openssl/fuzz/ml-kem.c
210
*key1 = *key2 = NULL;
crypto/openssl/fuzz/ml-kem.c
246
key = (EVP_PKEY **)key2;
crypto/openssl/fuzz/ml-kem.c
406
static void mlkem_kex(uint8_t **buf, size_t *len, void *key1, void *key2,
crypto/openssl/fuzz/ml-kem.c
410
EVP_PKEY *bob = (EVP_PKEY *)key2;
crypto/openssl/fuzz/ml-kem.c
444
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/ml-kem.c
489
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/ml-kem.c
492
EVP_PKEY *bob = (EVP_PKEY *)key2;
crypto/openssl/fuzz/ml-kem.c
512
static void cleanup_mlkem_keys(void *key1, void *key2,
crypto/openssl/fuzz/ml-kem.c
516
EVP_PKEY_free((EVP_PKEY *)key2);
crypto/openssl/fuzz/slh-dsa.c
307
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/slh-dsa.c
418
void *key2, void **out1, void **out2)
crypto/openssl/fuzz/slh-dsa.c
422
EVP_PKEY *bob = (EVP_PKEY *)key2;
crypto/openssl/include/crypto/aes_platform.h
230
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
236
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
243
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
247
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
252
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
256
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
345
const AES_KEY *key2, const unsigned char *ivec);
crypto/openssl/include/crypto/aes_platform.h
348
const AES_KEY *key2, const unsigned char *ivec);
crypto/openssl/include/crypto/aes_platform.h
351
const AES_KEY *key2, const unsigned char *ivec);
crypto/openssl/include/crypto/aes_platform.h
354
const AES_KEY *key2, const unsigned char *ivec);
crypto/openssl/include/crypto/aes_platform.h
41
const AES_KEY *key2, const unsigned char iv[16]);
crypto/openssl/include/crypto/aes_platform.h
44
const AES_KEY *key2, const unsigned char iv[16]);
crypto/openssl/include/crypto/aes_platform.h
477
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
483
const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
540
const AES_KEY *key2, const unsigned char iv[16]);
crypto/openssl/include/crypto/aes_platform.h
543
const AES_KEY *key2, const unsigned char iv[16]);
crypto/openssl/include/crypto/aes_platform.h
55
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/include/crypto/aes_platform.h
58
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/include/crypto/ml_dsa.h
85
__owur int ossl_ml_dsa_key_equal(const ML_DSA_KEY *key1, const ML_DSA_KEY *key2,
crypto/openssl/include/crypto/ml_kem.h
269
__owur int ossl_ml_kem_pubkey_cmp(const ML_KEM_KEY *key1, const ML_KEM_KEY *key2);
crypto/openssl/include/crypto/modes.h
149
void *key1, *key2;
crypto/openssl/include/crypto/slh_dsa.h
32
__owur int ossl_slh_dsa_key_equal(const SLH_DSA_KEY *key1, const SLH_DSA_KEY *key2,
crypto/openssl/include/crypto/sm4_platform.h
112
size_t len, const SM4_KEY *key1, const SM4_KEY *key2,
crypto/openssl/include/crypto/sm4_platform.h
116
const SM4_KEY *key2, const unsigned char ivec[16],
crypto/openssl/include/crypto/sm4_platform.h
88
size_t len, const SM4_KEY *key1, const SM4_KEY *key2,
crypto/openssl/include/crypto/sm4_platform.h
91
size_t len, const SM4_KEY *key1, const SM4_KEY *key2,
crypto/openssl/include/openssl/aes.h
93
size_t length, const AES_KEY *key, const AES_KEY *key2,
crypto/openssl/include/openssl/des.h
195
void DES_string_to_2keys(const char *str, DES_cblock *key1, DES_cblock *key2);
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts.c
165
if (in->xts.key2 != NULL) {
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts.c
166
if (in->xts.key2 != &in->ks2)
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts.c
188
|| ctx->xts.key2 == NULL
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts.c
207
(*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2, ctx->base.iv);
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts.h
22
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts_hw.c
111
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts_hw.c
116
const AES_KEY *key1, const AES_KEY *key2,
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts_hw.c
35
xctx->xts.key2 = &xctx->ks2; \
crypto/openssl/providers/implementations/ciphers/cipher_aes_xts_hw.c
98
dctx->xts.key2 = &dctx->ks2.ks;
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.c
110
if (in->xts.key2 != NULL) {
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.c
111
if (in->xts.key2 != &in->ks2)
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.c
128
|| ctx->xts.key2 == NULL
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.c
147
(*ctx->stream)(in, out, inl, ctx->xts.key1, ctx->xts.key2,
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.c
154
(*ctx->stream_gb)(in, out, inl, ctx->xts.key1, ctx->xts.key2,
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts.h
16
const SM4_KEY *key1, const SM4_KEY *key2,
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts_hw.c
28
xctx->xts.key2 = &xctx->ks2; \
crypto/openssl/providers/implementations/ciphers/cipher_sm4_xts_hw.c
83
dctx->xts.key2 = &dctx->ks2.ks;
crypto/openssl/providers/implementations/encode_decode/encode_key2ms.c
208
return key2##output##_encode(vctx, key, selection, cout, type##_set1, \
crypto/openssl/providers/implementations/kem/ec_kem.c
215
static int ossl_ec_match_params(const EC_KEY *key1, const EC_KEY *key2)
crypto/openssl/providers/implementations/kem/ec_kem.c
220
const EC_GROUP *group2 = EC_KEY_get0_group(key2);
crypto/openssl/providers/implementations/kem/ecx_kem.c
180
static int ecx_match_params(const ECX_KEY *key1, const ECX_KEY *key2)
crypto/openssl/providers/implementations/kem/ecx_kem.c
182
return (key1->type == key2->type && key1->keylen == key2->keylen);
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
161
const ECX_KEY *key2 = keydata2;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
168
ok = ok && key1->type == key2->type;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
174
const unsigned char *pb = key2->haspubkey ? key2->pubkey : NULL;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
176
size_t pbl = key2->keylen;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
180
&& key1->type == key2->type
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
189
const unsigned char *pb = key2->privkey;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
191
size_t pbl = key2->keylen;
crypto/openssl/providers/implementations/keymgmt/ecx_kmgmt.c
195
&& key1->type == key2->type
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
158
const MAC_KEY *key2 = keydata2;
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
165
if ((key1->priv_key == NULL && key2->priv_key != NULL)
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
166
|| (key1->priv_key != NULL && key2->priv_key == NULL)
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
167
|| key1->priv_key_len != key2->priv_key_len
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
168
|| (key1->cipher.cipher == NULL && key2->cipher.cipher != NULL)
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
169
|| (key1->cipher.cipher != NULL && key2->cipher.cipher == NULL))
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
173
|| CRYPTO_memcmp(key1->priv_key, key2->priv_key, key1->priv_key_len) == 0);
crypto/openssl/providers/implementations/keymgmt/mac_legacy_kmgmt.c
175
ok = ok && EVP_CIPHER_is_a(key1->cipher.cipher, EVP_CIPHER_get0_name(key2->cipher.cipher));
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
164
const ML_DSA_KEY *key2 = keydata2;
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
168
if (key1 == NULL || key2 == NULL)
crypto/openssl/providers/implementations/keymgmt/ml_dsa_kmgmt.c
170
return ossl_ml_dsa_key_equal(key1, key2, selection);
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
210
const ML_KEM_KEY *key2 = vkey2;
crypto/openssl/providers/implementations/keymgmt/ml_kem_kmgmt.c
219
return ossl_ml_kem_pubkey_cmp(key1, key2);
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
121
const MLX_KEY *key2 = vkey2;
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
123
int have_pub2 = mlx_kem_have_pubkey(key2);
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
129
if (key1->xinfo != key2->xinfo)
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
142
return EVP_PKEY_eq(key1->mkey, key2->mkey)
crypto/openssl/providers/implementations/keymgmt/mlx_kmgmt.c
143
&& EVP_PKEY_eq(key1->xkey, key2->xkey);
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
89
const SLH_DSA_KEY *key2 = keydata2;
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
93
if (key1 == NULL || key2 == NULL)
crypto/openssl/providers/implementations/keymgmt/slh_dsa_kmgmt.c
95
return ossl_slh_dsa_key_equal(key1, key2, selection);
crypto/openssl/test/igetest.c
195
AES_KEY key2;
crypto/openssl/test/igetest.c
203
AES_set_encrypt_key(v->key2, 8 * v->keysize, &key2);
crypto/openssl/test/igetest.c
206
AES_set_decrypt_key(v->key2, 8 * v->keysize, &key2);
crypto/openssl/test/igetest.c
209
AES_bi_ige_encrypt(v->in, buf, v->length, &key1, &key2, v->iv,
crypto/openssl/test/igetest.c
214
test_output_memory("key 2", v->key2, sizeof(v->key2));
crypto/openssl/test/igetest.c
329
AES_KEY key, key2;
crypto/openssl/test/igetest.c
336
AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
337
AES_bi_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, &key2, iv,
crypto/openssl/test/igetest.c
341
AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
342
AES_bi_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, &key2, iv,
crypto/openssl/test/igetest.c
350
AES_KEY key, key2;
crypto/openssl/test/igetest.c
359
AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
366
AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
381
AES_KEY key, key2;
crypto/openssl/test/igetest.c
390
AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
397
AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
412
AES_KEY key, key2;
crypto/openssl/test/igetest.c
421
AES_set_encrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
428
AES_set_decrypt_key(rkey2, 8 * sizeof(rkey2), &key2);
crypto/openssl/test/igetest.c
82
const unsigned char key2[32];
crypto/openssl/test/pkcs12_api_test.c
68
EVP_PKEY *key2 = NULL;
crypto/openssl/test/pkcs12_api_test.c
83
if (!TEST_true(PKCS12_parse(p12new, "NEWPASS", &key2, &cert2, &ca2)))
crypto/openssl/test/pkcs12_api_test.c
86
if (!TEST_ptr(key2) || !TEST_int_eq(EVP_PKEY_eq(key, key2), 1))
crypto/openssl/test/pkcs12_api_test.c
97
EVP_PKEY_free(key2);
crypto/openssl/test/rsa_test.c
201
clen = key2(*key, ctext);
crypto/openssl/test/tls-provider.c
875
const XORKEY *key2 = keydata2;
crypto/openssl/test/tls-provider.c
878
if (key1->tls_name != NULL && key2->tls_name != NULL)
crypto/openssl/test/tls-provider.c
879
ok = ok & (strcmp(key1->tls_name, key2->tls_name) == 0);
crypto/openssl/test/tls-provider.c
883
if (key2->hasprivkey)
crypto/openssl/test/tls-provider.c
884
ok = ok & (CRYPTO_memcmp(key1->privkey, key2->privkey, XOR_KEY_SIZE) == 0);
crypto/openssl/test/tls-provider.c
886
ok = ok & xor_recreate(key1->privkey, key2->pubkey);
crypto/openssl/test/tls-provider.c
888
if (key2->hasprivkey)
crypto/openssl/test/tls-provider.c
889
ok = ok & xor_recreate(key2->privkey, key1->pubkey);
crypto/openssl/test/tls-provider.c
897
if (key2->haspubkey)
crypto/openssl/test/tls-provider.c
898
ok = ok & (CRYPTO_memcmp(key1->pubkey, key2->pubkey, XOR_KEY_SIZE) == 0);
crypto/openssl/test/tls-provider.c
900
ok = ok & xor_recreate(key1->pubkey, key2->privkey);
crypto/openssl/test/tls-provider.c
902
if (key2->haspubkey)
crypto/openssl/test/tls-provider.c
903
ok = ok & xor_recreate(key2->pubkey, key1->privkey);
lib/libc/iconv/citrus_pivot_factory.c
109
char key1[LINE_MAX], key2[LINE_MAX], data[LINE_MAX];
lib/libc/iconv/citrus_pivot_factory.c
137
snprintf(key2, sizeof(key2), "%.*s", (int)(p - line), line);
lib/libc/iconv/citrus_pivot_factory.c
152
return (_db_factory_add32_by_s(se->se_df, key2, val));
lib/libnv/tests/nv_tests.cc
626
const char *key1, *key2;
lib/libnv/tests/nv_tests.cc
636
key2 = "key2";
lib/libnv/tests/nv_tests.cc
637
ATF_REQUIRE_EQ(keylen, strlen(key2));
lib/libnv/tests/nv_tests.cc
638
nvlist_add_number(nvl, key2, 10);
lib/libnv/tests/nv_tests.cc
649
memcpy(keypos, key2, keylen);
sys/compat/linux/linux_futex.c
628
struct umtx_key key, key2;
sys/compat/linux/linux_futex.c
638
error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2);
sys/compat/linux/linux_futex.c
652
umtxq_lock(&key2);
sys/compat/linux/linux_futex.c
653
count = umtxq_count(&key2);
sys/compat/linux/linux_futex.c
655
ret += umtxq_signal_mask(&key2, nrwake, args->val3);
sys/compat/linux/linux_futex.c
658
umtxq_unlock(&key2);
sys/compat/linux/linux_futex.c
663
umtx_key_release(&key2);
sys/compat/linux/linux_futex.c
672
struct umtx_key key, key2;
sys/compat/linux/linux_futex.c
695
error = futex_key_get(args->uaddr2, TYPE_FUTEX, GET_SHARED(args), &key2);
sys/compat/linux/linux_futex.c
709
umtxq_lock(&key2);
sys/compat/linux/linux_futex.c
710
td->td_retval[0] = umtxq_requeue(&key, nrwake, &key2, nrrequeue);
sys/compat/linux/linux_futex.c
711
umtxq_unlock(&key2);
sys/compat/linux/linux_futex.c
714
umtx_key_release(&key2);
sys/dev/ath/ath_hal/ar5210/ar5210_keycache.c
112
uint32_t key0, key1, key2, key3, key4;
sys/dev/ath/ath_hal/ar5210/ar5210_keycache.c
137
key2 = LE_READ_4(k->kv_val+6) ^ xorMask;
sys/dev/ath/ath_hal/ar5210/ar5210_keycache.c
151
OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
sys/dev/ath/ath_hal/ar5211/ar5211_keycache.c
119
uint32_t key0, key1, key2, key3, key4;
sys/dev/ath/ath_hal/ar5211/ar5211_keycache.c
158
key2 = LE_READ_4(k->kv_val+6) ^ xorMask;
sys/dev/ath/ath_hal/ar5211/ar5211_keycache.c
172
OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
sys/dev/ath/ath_hal/ar5212/ar5212_keycache.c
160
uint32_t key0, key1, key2, key3, key4;
sys/dev/ath/ath_hal/ar5212/ar5212_keycache.c
217
key2 = LE_READ_4(k->kv_val+6) ^ xorMask;
sys/dev/ath/ath_hal/ar5212/ar5212_keycache.c
240
OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
sys/dev/ath/ath_hal/ar5212/ar5212_keycache.c
293
OS_REG_WRITE(ah, AR_KEYTABLE_KEY2(entry), key2);
sys/dev/ice/ice_flex_type.h
177
struct ice_boost_key_value key2;
sys/kern/kern_umtx.c
644
umtxq_requeue(struct umtx_key *key, int n_wake, struct umtx_key *key2,
sys/kern/kern_umtx.c
653
UMTXQ_LOCKED_ASSERT(umtxq_getchain(key2));
sys/kern/kern_umtx.c
663
uq->uq_key = *key2;
sys/netinet/sctp_auth.c
348
sctp_compare_key(sctp_key_t *key1, sctp_key_t *key2)
sys/netinet/sctp_auth.c
358
key2len = sctp_get_keylen(key2);
sys/netinet/sctp_auth.c
372
key_2 = key2->key;
sys/netinet/sctp_auth.c
399
sctp_compute_hashkey(sctp_key_t *key1, sctp_key_t *key2, sctp_key_t *shared)
sys/netinet/sctp_auth.c
405
keylen = sctp_get_keylen(key1) + sctp_get_keylen(key2) +
sys/netinet/sctp_auth.c
423
if (sctp_compare_key(key1, key2) <= 0) {
sys/netinet/sctp_auth.c
433
if (sctp_get_keylen(key2)) {
sys/netinet/sctp_auth.c
434
memcpy(key_ptr, key2->key, key2->keylen);
sys/netinet/sctp_auth.c
442
if (sctp_get_keylen(key2)) {
sys/netinet/sctp_auth.c
443
memcpy(key_ptr, key2->key, key2->keylen);
sys/netinet/sctp_auth.c
444
key_ptr += key2->keylen;
sys/netinet/sctp_auth.h
130
sctp_compute_hashkey(sctp_key_t *key1, sctp_key_t *key2,
sys/opencrypto/xform_aes_xts.c
103
rijndael_encrypt(&ctx->key2, ctx->tweak, ctx->tweak);
sys/opencrypto/xform_aes_xts.c
178
rijndael_set_key(&ctx->key2, key + (len / 2), len * 4);
sys/opencrypto/xform_enc.h
115
rijndael_ctx key2;
tools/tools/ath/athregs/dumpregs.c
685
u_int32_t key0, key1, key2, key3, key4;
tools/tools/ath/athregs/dumpregs.c
706
key2 = OS_REG_READ(ah, AR_KEYTABLE_KEY2(entry));
tools/tools/ath/athregs/dumpregs.c
723
, (key2 >> 0) & 0xff
tools/tools/ath/athregs/dumpregs.c
724
, (key2 >> 8) & 0xff
tools/tools/ath/athregs/dumpregs.c
725
, (key2 >> 16) & 0xff
tools/tools/ath/athregs/dumpregs.c
726
, (key2 >> 24) & 0xff